×

Trusted computing

  • US 9,569,638 B2
  • Filed: 12/31/2014
  • Issued: 02/14/2017
  • Est. Priority Date: 12/31/2014
  • Status: Active Grant
First Claim
Patent Images

1. A trusted computing device, comprising:

  • an isolated environment comprising;

    an isolated environment processor;

    memory comprising a secure partition and a non-secure partition, the memory connected for data communication with the isolated environment processor; and

    an auxiliary processor connected for data communication with the isolated environment processor and the memory,wherein the memory and the auxiliary processor communicate with a host only through the isolated environment processor;

    a host interface connected for data communication with the isolated environment processor;

    at least one secure interface, separate from the host interface and connected for data communication with the isolated environment processor; and

    a computer program product comprising a non-transitory computer-readable media having computer-executable program instructions embodied thereon that, when executed by the trusted computing device, cause the trusted computing device to;

    provision the trusted computing device for cryptographic operations via the at least one secure interface;

    present a first file system partition at the host interface via the isolated environment processor, the first file system partition comprising a host write file and a host read file, wherein file creation and file deletion privileges are allocated only to the isolated environment processor;

    present a non-secured second file system partition with access to the memory non-secure partition via the host interface via the isolated environment processor;

    receive, via the host write file, requests to perform trusted computing in the isolated environment, the trusted computing comprising one or more of;

    random number generation, append-only logging, monotonic counting, streaming encryption and decryption, bulk encryption and decryption, and isolated storage;

    perform the requested trusted computing using at least one of the isolated environment processor, the memory secure partition and the auxiliary processor; and

    write the trusted computing results to the host read-only file.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×